Nobody downloaded yet

Cyber Security in Business Organizations - Case Study Example

Comments (0) Cite this document
Summary
With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks. Failure of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Cyber Security in Business Organizations
Read TextPreview

Extract of sample "Cyber Security in Business Organizations"

Download file to see previous pages Information security failures tip the balance and expose organizations to the aforementioned threats.
Organizations are challenged by the trend to ‘go global’ which implies that security programs should encompass the entire global market of a firm. In effect, this means that each individual unit of the firm dispersed globally should take responsibility for the security risks that are encountered. Despite having a strong central security infrastructure in place, ownership is an important issue that drives information security forward, especially in situations where the business critical applications lie outside the infrastructure (Johnson and Goetz, 2007).
Internal organizational factors are also critical to the information security challenge. Education and consultancy within the organization has become important to ensure that employees understand what they are asking for so that security professionals can better respond to the need of the situation. However, spreading awareness through consultancy is not an absolute solution. Many organizational members are resistant to change and change management is a subject executives are often concerned about. Facilitating a proactive work culture and involving line managers to take responsibility and auditors to enforce security can be pivotal. This can ensure compliance and help deal with information security issues by making internal employees accountable (Johnson and Goetz, 2007).
Protecting data and information in the midst of mobile technology has become an even greater challenge. The new age of smart phones has built a collaborative environment where protecting information security and intellectual property has become a great concern. Permissions are granted through a strong identity management system to access the information. However, a lot of it has to do with policy making and the enforceability of such policies. Compliance with information security standards is another challenge for many ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Security in Business Organizations Case Study”, n.d.)
Cyber Security in Business Organizations Case Study. Retrieved from https://studentshare.org/information-technology/1694134-cyber-security-in-business-organizations
(Cyber Security in Business Organizations Case Study)
Cyber Security in Business Organizations Case Study. https://studentshare.org/information-technology/1694134-cyber-security-in-business-organizations.
“Cyber Security in Business Organizations Case Study”, n.d. https://studentshare.org/information-technology/1694134-cyber-security-in-business-organizations.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Security in Business Organizations

Cyber Security

...confidentiality of message by using secured protocol links, and never save passwords or any other secreted information in plain alphabets. (J.D. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla and A. Murukan (Janaury 2006)) Anti Virus Software- an Antivirus software is made so that it can detect viruses and then prevent them from harming your operating system by fixing them. They are an all time countermeasure. (Conrad, E., Misenar, S., & Feldman, J. (2010)) You as an organization have to eschew these types of situations that are the reason you need to know about cyber safety and what to do to save yourself and your computers from these vulnerabilities. You have to find out how...
10 Pages(2500 words)Coursework

Cyber security

...? Cyber Security Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights. Owners of the creations are granted exclusive rights on intangible assets as stipulated in the intellectual property law on intangible creations such as music, works of art, inventions, designs, symbols and innovations. Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the...
4 Pages(1000 words)Coursework

Cyber security

...the confidentiality of the United States security and official data. The United States cannot try him since there is no international rule that considers his actions a crime. Additionally, national rules and laws of a single state cannot be applied to citizens of other countries. It is extremely essential that cyber security be considered a vital issue in a meeting of the United Nations. In the meeting, it is anticipated that the organization should declare cyber breaching and leaking a global crime, so that the trial of those culprits should be undertaken by the aggrieved countries, irrespective of the geographic boundaries. Additionally,...
2 Pages(500 words)Coursework

Cyber security

...that is not linked to a specific business corporation on purpose (Bandy, Money, & Worstell, Intrusion Detection FAQ: What is a honeypot? Why do I need one?, 2013). It is an admitted fact that the honeypots can be very helpful to business corporations that have considerable resources to maintain them. However, if an organization does not have a security expert to strictly keep an eye on a honeypot the organizations has, at finest, built a susceptible platform that is not checked regularly as well as at worst, a platform that can be occupied and employed by any hacker to attack other systems. Moreover, there is a possible legal responsibility inbuilt in...
1 Pages(250 words)Coursework

Cyber Security

...security is used to denote cyber security. Effective cyber security employs coordinated efforts throughout the information system. Some of the major elements of cyber security include end-user education, application security, disaster recovery/ business continuity planning, network security and information security (Marshall, 85). World governments devote huge sums of their annual budgets towards enhancing cyber security with the United States in particular, since 2010 allocating over 13 million USD annually for the...
1 Pages(250 words)Essay

Cyber Security

...Cyber Security Cyber Security Today, business and personal operations depend on computers and technology. With the innovation of internet and high levels of computer programming, organizations are dependent on computer programs to make their operation smoother, less time-consuming and error free. Various services like banking and finance, personal investment, clothing stores or any other electronic or non-electronic products access consumer by simply logging on to the internet. US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives, and protecting our digital infrastructure from cyber threats is one of our highest security priorities” (Martin, 2013). With the development of science... and...
10 Pages(2500 words)Term Paper

Cyber Security and Business

...that motivates and endorses incentives for organizations to adopt broadly needed sound security practices. Thus, offering support for research required to improve future national protection and articulating to organizational managers the need to invest in cyber security in order to improve the nation’s security because a secure nation is an ideal place to do business (Heiman 99). Effects on national security due to exceeding the minimum requirements The impact of cyber security regulation on national security due to exceeding minimum requirements...
6 Pages(1500 words)Term Paper

Cyber Security

...Cyber Security Stuxnet is a computer virus designed specifically to aid hackers attack industrial plants without the knowledge or identification of the operators. It is the first attack that grants the hackers the opportunity of manipulating world equipment and as a result of this, it is very dangerous. Stuxnet is a product of the U.S and Israel project (Bacrach, 2013). Its impact is well known; it destroyed approximately 20% of Iran’s nuclear centrifuges through making them spin uncontrollably. It also infected a Russian nuclear power plant very badly. In tandem to this, the paper aims at providing detailed information on how Stuxnet was introduced to Iran’s and Russian power plants, how it spread to the...
3 Pages(750 words)Essay

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain...
1 Pages(250 words)Essay

Cyber Security in Business Organizations

...Cyber Security in Business Organizations Number Aftermath analysis and investigations into what is perhaps the greatest retail hack in the history of the United States reveals that the act was not really unavoidable or was it a superiorly skilled undertaking. In fact, revelations point to the fact that the event would have been easily prevented had security alerts been heeded and promptly addressed (Riley, Elgin, Lawrence & Matlack, 2014, March 13). Before 2013’s thanksgiving, a malware was installed in Target’s systems for payment and security to facilitate the theft of the cards that would be utilized in all the retail’s US stores....
3 Pages(750 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Cyber Security in Business Organizations for FREE!

Contact Us